The policy knot: re-integrating policy, practice and design in cscw studies of social computing
暂无分享,去创建一个
Sandra Payette | Steven J. Jackson | Tarleton Gillespie | Tarleton Gillespie | S. Jackson | Sandra Payette
[1] Derek E. Bambauer,et al. UNIVERSITY of PENNSYLVANIA LAW REVIEW , 2014 .
[2] P. N. Edwards,et al. Knowledge Infrastructures: Intellectual Frameworks and Research Challenges , 2013 .
[3] Sarah Barbrow,et al. Infrastructure and vocation: field, calling and computation in ecology , 2013, CHI.
[4] Scott Counts,et al. Proceedings of the 2013 conference on Computer supported cooperative work , 2013, CSCW 2013.
[5] Drew Paine,et al. The work of developing cyberinfrastructure middleware projects , 2013, CSCW.
[6] Cliff Lampe,et al. Users and nonusers: interactions between levels of adoption and social capital , 2013, CSCW '13.
[7] Theresa Velden,et al. Explaining field differences in openness and sharing in scientific communities , 2013, CSCW.
[8] Steven J. Jackson,et al. Why CSCW needs science policy (and vice versa) , 2013, CSCW.
[9] Helena M. Mentis,et al. Non-static nature of patient consent: shifting privacy perspectives in health information sharing , 2013, CSCW.
[10] Yunan Chen,et al. Privacy management in dynamic groups: understanding information privacy in medical practices , 2013, CSCW.
[11] Jens Grossklags,et al. An online experiment of privacy authorization dialogues for social applications , 2013, CSCW.
[12] Judith Fathallah. Reclaiming Fair Use: How to Put Balance Back in Copyright , 2012 .
[13] Louise Barkhuus. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI , 2012, CHI.
[14] Margaret L. Hedstrom,et al. How research funding affects data sharing , 2012, CSCW.
[15] Pamela J. Wisniewski,et al. Reconciling privacy with social media , 2012, CSCW.
[16] Frederic Stutzman,et al. Boundary regulation in social media , 2012, CSCW.
[17] Users and Nonusers : Interactions between Levels of Facebook Adoption and Social Capital , 2012 .
[18] Paul Dourish,et al. The value of data: considering the context of production in data economies , 2011, CSCW.
[19] Katz v. United States , 2010 .
[20] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[21] S. Wyatt. Technological determinism is dead; Long live technological determinism. , 2008 .
[22] Lucy Suchman,et al. Human-Machine Reconfigurations: Plans and Situated Actions , 2006 .
[23] Paul Dourish,et al. Implications for design , 2006, CHI.
[24] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[25] John Leslie King,et al. Rob Kling and the Irvine School , 2004, Inf. Soc..
[26] S. Jasanoff. States of Knowledge: The Co-production of Science and the Social Order , 2004 .
[27] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[28] Edward W. Felten,et al. A skeptical view of DRM and fair use , 2003, CACM.
[29] Rob Kling,et al. Social Informatics: A New Perspective on Social Research about Information and Communication Technologies , 2000 .
[30] Mark S. Ackerman,et al. The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility , 2000, Hum. Comput. Interact..
[31] Charles Bazerman,et al. The Languages Of Edison's Light , 2001 .
[32] Bonnie A. Nardi,et al. Information Ecologies: Using Technology with Heart , 1999 .
[33] Y. Engeström,et al. Perspectives on activity theory: Introduction , 1999 .
[34] Y. Engeström,et al. Perspectives on activity theory: Play, learning, and instruction , 1999 .
[35] R. Nelson. Bicycles, bakelites and bulbs: Toward a theory of sociotechnical change , 1997 .
[36] David G. Post. Law in cyberspace (tutorial session) (abstract only) , 1996, CSCW '96.
[37] R. Lamb,et al. Of Bicycles, Bakelites, and Bulbs: Toward a Theory of Sociotechnical Change , 1996, Inf. Process. Manag..
[38] Hugh Richard Slotten,et al. Selling the Air: A Critique of the Policy of Commercial Broadcasting in the United States by Thomas Streeter (review) , 1996, Technology and Culture.
[39] A. Roland,et al. Does Technology Drive History? The Dilemma of Technological Determinism. , 1995 .
[40] Karen Ruhleder,et al. Steps towards an ecology of infrastructure: complex problems in design and access for large-scale collaborative systems , 1994, CSCW '94.
[41] Frank Webster,et al. What Information Society? , 1994, Inf. Soc..
[42] Rob Kling,et al. Controversies about privacy and open information in CSCW , 1992, CSCW '92.
[43] R. Kling. Computerization and Social Transformations , 1991 .
[44] C. Marvin,et al. Review: When Old Technologies Were New, by Carolyn Marvin, Oxford University Press , 1989 .
[45] Jonathan Grudin,et al. Why CSCW applications fail: problems in the design and evaluationof organizational interfaces , 1988, CSCW '88.
[46] T. P. Hughes,et al. The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology , 1989 .
[47] T. Pinch,et al. The Social Construction of Facts and Artefacts: or How the Sociology of Science and the Sociology of Technology might Benefit Each Other , 1984 .
[48] Stephen D. Krasner. Structural causes and regime consequences: regimes as intervening variables , 1982, International Organization.
[49] Rob Kling,et al. The Web of Computing: Computer Technology as Social Organization , 1982, Adv. Comput..
[50] H. Butterfield,et al. The Whig interpretation of history , 1931 .
[51] mile .QDurkheim mile Durkheim,et al. The Elementary Forms of Religious Life , 1916 .